Connecting virtual networks and risk assessment plan

Assignment Help Computer Networking
Reference no: EM132894838

MITS 6001 Cloud Computing - Victorian Institute of Technology

Assignment - Connecting Virtual Networks and Risk Assessment Plan

Task:

Task 1: Connecting two VMs
As a Cloud engineer of a financial organisation you have been asked to design and implement a cloud solution for your existing IT infrastructure. Currently the company has different departments in two separate buildings in Melbourne.

In this section, you need to deploy two VMs into the virtual network and securely communicate between the two VMs in azure platform. Write a summary of your understanding about output (500 words) at the end of the section.

**Note: Configuration details are provided in the same document. Create each component with the name as instructed below

Task 2: Risk Management Plan

CTO of your company conducted a RISK Management under which Risk Assessment is completed. Results show that some security issues were identified.
1) Distributed-Denial-of-Service Attacks
2) Shared Cloud Computing Services
3) Employee Negligence
CTO have asked you to further explore the Risk Management plan. You have been asked to write an executive summary identifying the risk treatment and risk control plan for the above-mentioned issues.

Attachment:- Connecting Virtual Networks.rar

Reference no: EM132894838

Questions Cloud

Managers face in the financial distress process : What key issues must managers face in the financial distress process? cite and reference please.
Determine the Suburban segment contribution margin : In addition, the company incurred common fixed costs of $60,000 and tax rate is 40%. Determine the Suburban's segment contribution margin
Characterize the green movement in advertising : Characterize the green movement in advertising. Evaluate its success in changing advertising's view of environmental issues and causes.
Designing a questionnaire or use archival data : Research paper. Explain how will collect the data to analyze research question. Will be designing a questionnaire or use archival data?
Connecting virtual networks and risk assessment plan : Connecting Virtual Networks and Risk Assessment Plan - Solution for your existing IT infrastructure Currently the company has different departments in two separ
What commitment represents in your life : Make sure you present your point of view about the following: What commitment represents in your life?
Example of analytics-driven revenue generation : What would be and example of analytics-driven revenue generation looking at the companies in the movie industry?
Identify the different types of hospitals : The AHA (American Hospital Association) identifies 6 groups of hospitals:
How the flow of communication affects organizational culture : Companies with strong cultures have a strong flow of communication that moves in every direction (1):Downward:

Reviews

Write a Review

Computer Networking Questions & Answers

  Which has access to the raw message

Please answer this post like discussion if you agree or disagree, and why? Please explain it. This post is the answer from somebody else about question

  Explain how to formulate a query

Determine the functional dependences - Build this model using MS Access by creating these tables and Relationships. Populate these tables with appropriate data

  Discuss the encryption process

Beginning with Windows Vista, Microsoft included a feature called BitLocker that enables a user to encrypt the computer's hard drive as an added measure.

  Type of network provides limited access to corporate data

Which type of network provides customers with limited access to corporate data such as inventory, parts lists, and orders?

  How do the subnets affect the domain design

How do the subnets affect the domain design, Can security be improved by implementing a different domain model? If so, which domain model do you recommend

  Configure VLANs and Root bridge

Create the transform set VPN-SET to use esp-aes 256 and esp-sha-hmac. Then create the crypto map CMAP that binds all of the Phase 2 parameters together

  Software application packages function

True or false? Software application packages function as the interface between the operating system and firmware. TrueFalse

  ICT120 Introduction to Computer Networks Assignment

ICT120 Introduction to Computer Networks Assignment Help and Solution, University of the Sunshine Coast - Assessment Writing Service - Demonstrate the path

  Describe the location and the use of a geo satellite

Digital cellular telephones can be used for what common applications? List and explain five of them. Define i-Mode. Describe the location and the use of a GEO satellite.

  Discuss concepts applicable to it systems development

Given the readings and assignments in the course, identify and briefly discuss two important concepts applicable to IT systems development.

  Define arbitrary waveform generation

Compare and contrast DDS, digital resonator, and lookup table methods of sinusoid generation.

  Company in manhattan still keeps to the traditional mailing

A company in Manhattan still keeps to the traditional mailing approaches even though the nature of their business strictly involves confidential documents that need to be sent to clients. Tell this Manhattan company why you think their messages can b..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd